Accept, or Drop Ethernet Frames with Specific Protocols

Important - In a ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing., you must configure all the Cluster Members in the same way.

By default, Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. and Cluster in Bridge modeClosed Security Gateway or Virtual System that works as a Layer 2 bridge device for easy deployment in an existing topology. allows Ethernet frames that carry protocols other than IPv4 (0x0800), IPv6 (0x86DD), or ARP (0x0806) protocols.

Administrator can configure a Security Gateway and Cluster in Bridge Mode to either accept, or drop Ethernet frames that carry specific protocols.

When Access Mode VLAN (VLAN translation) is configured, BPDU frames can arrive with the wrong VLAN number to the switch ports through the Bridge interface. This mismatch can cause the switch ports to enter blocking mode.

In Active/Standby Bridge Mode only, you can disable BPDU forwarding to avoid such blocking mode:

Step

Instructions

1

Connect to the command line on the Security Gateway (each Cluster MemberClosed Security Gateway that is part of a cluster.).

2

Log in to the Expert mode.

3

Backup the current /etc/rc.d/init.d/network file:

cp -v /etc/rc.d/init.d/network{,_BKP}

4

Edit the current /etc/rc.d/init.d/network file:

vi /etc/rc.d/init.d/network

5

After the line:

./etc/init.d/functions

Add this line:

/sbin/sysctl -w net.bridge.bpdu_forwarding=0

6

Save the changes in the file and exit the Vi editor.

7

Reboot the Security Gateway (each Cluster Member).

8

Make sure the new configuration is loaded:

sysctl net.bridge.bpdu_forwarding

The output must show:

net.bridge.bpdu_forwarding = 0